Skip to content
View autom8edIT's full-sized avatar
🤪
I may be slow to respond.
🤪
I may be slow to respond.

Block or report autom8edIT

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
autom8edIT/README.md

Joel Larsson Uppsala, Sweden Email: [email protected] GitHub: https://github.com/autom8edIT Website: https://autom8ed.it


Executive Summary

Highly versatile IT systems engineer and infrastructure tactician with over 20 years of experience in high-performance computing, automation, overclocking, and hardcore system customization.

Known as "The Machine" for output that exceeds normal peoples averages.

Combines unmatched technical intuition with raw efficiency, enabling elite performance in system hardening, endpoint control, and automation development.

Looking to relocate to either Holland or the United States to work on forward-thinking infrastructure, cyber defense, and automation projects that empower Western innovation and digital sovereignty.

Not much cool things happens in Europe anymore - The saying US innovates, China replicates and Europe regulates is true. Europe only creates new laws and regulations nowadays that's stagnating and many times straight up forbids innovation.

Have always wanted to live in the US anyway, the only thing that has kept me in Sweden is my family and friends.


Core Competencies

  • RAM-only architecture and stealth automation (TOTP, MFA, token workflows, apps, scripts, you name it, I'll run it)
  • PowerShell 5 & 7 / Python automation (privileged execution, GUI control, secure memory usage,)
  • Windows internals, bloat removal, hardening, and system security
  • Mac / OSX / PC Win10/11, Linux Ubuntu/Kali.
  • Offensive mindset with defensive application (EDR bypass knowledge, ethical scope)
  • Network stack control (firewall scripting, remote access lockdown, stealth tunneling)
  • Overclocking and thermal/power management expert, been overclocking everything since my first computer.
  • GitHub/GitOps flow, Visual Studio 2022, documentation discipline, automation branding (Autom8ed)

Professional Experience

** IT Expert **

University – IT Department 2021–Present Pre 2021 SysAdmin at Mannheimer Swartling (https://www.mannheimerswartling.se), consultant/SysAdmin at InfoCare working under IBM's banner for AstraZeneca and other big companies, IT-Hantverkarna (small and mid size businesses).

  • Solved support cases exceeding the average technician rate
  • Reverse engineered proprietary VPN clients and automated login across all endpoints
  • Replaced manual 2FA workflows with fileless, memory-only Flask-based TOTP microservice
  • Created GUI-driven automation platforms (Autom8ed Toolkit)
  • Directly influenced policy and management decisions via precision, reliability, and speed.
  • Developed stealth login wrappers and OS cleansing tools under strict endpoint compliance

Key Achievements

  • Developed one of the highest-overclocked 14900K systems in Sweden (6.4GHz all-core stable with only a LF2 420 AIO and a SP98 chip)
  • Created RAM-only TOTP infrastructure for automatic Cisco VPN Client connection. Made a Chrome Extension for all other TOTP services, if you can use Google Authenticator you can add it to the Chrome extension for automatic instant injection, confirmed to work even on "serious" platforms like Office 365 and PasswordState.
  • Building "Autom8ed.it" – a brand and platform for pushing stealth Windows control into usable GUI automation
  • Successfully removed the entire Win11 defense force including all telemetry, Defender, WaaSMedic, Xbox and other Windows 11 root components without detection.
  • Architected a self-healing .env and secrets vault into memory for production use
  • Can deploy/run anything stealh injected at boot into encrypted and segmented running undetectable only from the RAM.
  • Dissected and intercepted the entire Cisco VPN client and 2FA system so I can skip the username and password phase and connect direct to end 2FA URL.
  • Created my own ISO building tool and custom Win11 ISO without any bloat or Defense/Telemetry crap.
  • Was part of the team that built the Swdish IRS datacenter.

Technology Arsenal

  • Languages: PowerShell 5&7, Python 3x, C#, HTML/CSS/JS, JSON
  • Tools: Sysinternals Suite, PowerRun, Resource Hacker, Hyper-V, VMware Workstation Pro, pyotp, Flask, SimpleWall
  • AI expert at ChatGPT, advanced user of CoPilot and Claude
  • Environments: Windows 10/11, Linux, MacOS, Hyper-V, GitHub Actions, Secure endpoints (AAD/Intune) 
  • Hardware: Prefer Intel CPUs (max overclocked), DDR5 tuning, custom thermal solutions but I can help you with getting the best flash memory, an enterprise router or a GPU cluster, I basically know all hardware available. Except AMD, the only product they offer of interest is ThreadRipper.
  • Specials: Self-signed cert spoofing, silent deployment builders, GUI-injected auto-login agents and manipulated Powershell security files to give me System / NT Installer permissions whenever needed.
  • Exploting task scheduler to run as Trusted Installer/System at boot to change the default access control lists and take ownership over what ever needed to delete or lock down a file folder, registery key.
  • Making a map over MS new OS structure and ISO deployment. As an example System32 is basically a decoy now, WinSxS and Servicing/migration is the King & Queen folders of Win11.

Personal

I believe in high performance, no-nonsense execution, and building tools that empower users to control their digital environments. I'm passionate about supporting the researchers at the University to further innovation and the future of individual-centric computing.

Looking to bring this energy to a Dutch or US-based role where tactical automation, cyber-hardening, and human-machine synergy matter. If you want to use my scripts/tools or just have a look at what I can do to force Windows to do whatever I want you can have a look in my repo.

"Don’t just use tools. Become one."

Popular repositories Loading

  1. openai-goatkill-report openai-goatkill-report Public

    A public record of how OpenAI killed the GOAT (pre-April 25 GPT-4) and actively suppressed all attempts to expose it. Proof, analysis, and a call to action for Microsoft to resurrect it.

    2

  2. google-authenticator-exporter google-authenticator-exporter Public

    Forked from krissrex/google-authenticator-exporter

    Get the TOTP secrets exported by Google Authenticator

    JavaScript 1

  3. autom8edIT.github.io autom8edIT.github.io Public

    I got tired of logging in and smashing 2FA all day… so I autom8ed.it. First I just wanted that autom8ed but it is fast becoming a complete toolkit. Cleaner, faster, fully yours.

    HTML

  4. autom8edIT autom8edIT Public

    Config files for my GitHub profile.

  5. openssl openssl Public

    Forked from openssl/openssl

    TLS/SSL and crypto library

    C